1. Lecture Notes in Computer Science;F. Arnault,2008
2. Babbage, S.: Improved ”exhaustive search” attacks on stream ciphers. In: IEE European Convention on Security and Detection, vol. 408, pp. 161–165 (1995)
3. Babbage, S., De Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio (rev.1), September 08 (2008),
http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf
4. Babbage, S., De Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio, April 15 (2008),
http://www.ecrypt.eu.org/stream/portfolio.pdf
5. Lecture Notes in Computer Science;S. Babbage,2008